WebApp Sec mailing list archives
Microsoft .NET request filtering bypass vulnerability (BID 20753)
From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 05 Apr 2007 16:57:50 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 FYI, The technical details for the Microsoft .NET request filtering bypass vulnerability (BID 20753) can be found on the following URL: http://www.procheckup.com/Vulner_PR0703.php -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGFRx+UmN3xwbmU6YRAmvGAKC6HYWmgsIt/SXIIR9gPvVFzIMy8QCgtFXs JkcdoHWDTLEaNg/tql7w5nA= =toNB -----END PGP SIGNATURE----- ------------------------------------------------------------------------- Sponsored by: Watchfire It's been reported that 75% of websites are vulnerable to attack. That's because hackers know to exploit weaknesses in web applications. Traditional approaches to securing these assets no longer apply. Download the "Addressing Challenges in Application Security" whitepaper today, and see for yourself. https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008fHF --------------------------------------------------------------------------
Current thread:
- Microsoft .NET request filtering bypass vulnerability (BID 20753) Adrian Pastor (Apr 05)